lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <tip-eccb1b936363c62544bccb5bbb75afec9536f7e3@git.kernel.org> Date: Sat, 21 Apr 2018 00:53:53 -0700 From: tip-bot for Arnaldo Carvalho de Melo <tipbot@...or.com> To: linux-tip-commits@...r.kernel.org Cc: jolsa@...nel.org, dsahern@...il.com, mingo@...nel.org, namhyung@...nel.org, hpa@...or.com, linux-kernel@...r.kernel.org, tglx@...utronix.de, adrian.hunter@...el.com, linux@...inikbrodowski.net, rostedt@...dmis.org, acme@...hat.com, wangnan0@...wei.com Subject: [tip:perf/urgent] perf test BPF: Fixup BPF test using epoll_pwait syscall function probe Commit-ID: eccb1b936363c62544bccb5bbb75afec9536f7e3 Gitweb: https://git.kernel.org/tip/eccb1b936363c62544bccb5bbb75afec9536f7e3 Author: Arnaldo Carvalho de Melo <acme@...hat.com> AuthorDate: Wed, 18 Apr 2018 12:59:03 -0300 Committer: Arnaldo Carvalho de Melo <acme@...hat.com> CommitDate: Wed, 18 Apr 2018 15:35:53 -0300 perf test BPF: Fixup BPF test using epoll_pwait syscall function probe Since e145242ea0df ("syscalls/core, syscalls/x86: Clean up syscall stub naming convention") changed the main syscall function for 'epoll_pwait' to something other than the expected 'SyS_epoll_pwait the' 'perf test BPF' entries started failing, fix it by using something called from the main syscall function instead, 'epoll_wait', which should keep this test working in older kernels too. Before: # perf test BPF 40: BPF filter : 40.1: Basic BPF filtering : FAILED! 40.2: BPF pinning : Skip 40.3: BPF prologue generation : Skip 40.4: BPF relocation checker : Skip If we use -v for that test we see the problem: Probe point 'SyS_epoll_pwait' not found. After: # perf test BPF 40: BPF filter : 40.1: Basic BPF filtering : Ok 40.2: BPF pinning : Ok 40.3: BPF prologue generation : Ok 40.4: BPF relocation checker : Ok # Cc: Adrian Hunter <adrian.hunter@...el.com> Cc: David Ahern <dsahern@...il.com> Cc: Dominik Brodowski <linux@...inikbrodowski.net> Cc: Jiri Olsa <jolsa@...nel.org> Cc: Namhyung Kim <namhyung@...nel.org> Cc: Steven Rostedt <rostedt@...dmis.org> Cc: Wang Nan <wangnan0@...wei.com> Link: https://lkml.kernel.org/r/tip-y24nmn70cs2am8jh4i344dng@git.kernel.org Signed-off-by: Arnaldo Carvalho de Melo <acme@...hat.com> --- tools/perf/tests/bpf-script-example.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/perf/tests/bpf-script-example.c b/tools/perf/tests/bpf-script-example.c index e4123c1b0e88..1ca5106df5f1 100644 --- a/tools/perf/tests/bpf-script-example.c +++ b/tools/perf/tests/bpf-script-example.c @@ -31,7 +31,7 @@ struct bpf_map_def SEC("maps") flip_table = { .max_entries = 1, }; -SEC("func=SyS_epoll_pwait") +SEC("func=do_epoll_wait") int bpf_func__SyS_epoll_pwait(void *ctx) { int ind =0;
Powered by blists - more mailing lists